White Papers by Topic: Endpoint protection

Resources available: 6

SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

SANS review of McAfees Server Security Suite Essentials that address some of the emerging challenges of securing virtual platforms and cloud environments.

EndPoint Interactive eGuide

In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on how best to manage them. Read on to learn how to make the most of endpoints in your enterprise.

Reducing the cost and complexity of endpoint management

IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations. Read this whitepaper to learn more.

Eight threats your anti-virus won't stop: Why you need endpoint security

News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes. This paper outlines eight common threats that traditional anti-virus alone won't stop, and explains how to protect your organization using endpoint security.

A Comprehensive Framework for Securing Virtualized Data Centers

Understand the real need for security solutions that can address the reality of expanding virtualization.

Strategies for Endpoint Security

Who would have thought that after 20-plus years of solid research and industry remedies that malware would still be a common malady on today’s PCs? This is not to say that the problem of computer viruses and trojans hasn’t changed…it has significantly. But today’s Internet-connected, application-integrated, global world makes it far easier for malware to sneak onto our computers to do bad things. Download this original InfoWorld report, "Strategies for Endpoint Security".

©1994-2014 Infoworld, Inc.